(3.236.175.108) 您好!臺灣時間:2021/02/28 03:08
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:陳信諺
研究生(外文):Hsin-Yen Chen
論文名稱:以屬性加密為基礎之電子病歷安全分享
論文名稱(外文):Secure Sharing of Electronic Medical Records by Applying Attribute-based Encryption
指導教授:黃國軒黃國軒引用關係
指導教授(外文):Kuo-Hsuan Huang
口試委員:黃國軒
口試委員(外文):Kuo-Hsuan Huang
口試日期:2014-07-15
學位類別:碩士
校院名稱:大同大學
系所名稱:資訊工程學系(所)
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:中文
論文頁數:42
中文關鍵詞:雲端屬性加密電子病歷病歷分享
外文關鍵詞:CloudAttribute-based EncryptionElectronic Medical RecordsMedical Records Sharing
相關次數:
  • 被引用被引用:0
  • 點閱點閱:256
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:15
  • 收藏至我的研究室書目清單書目收藏:1
病歷的電子化對於人口密集都市中的醫院是一項新型態的架構,以往每個病人到醫
院就診都會隨著時間產生出一份紙本病歷紀錄,造成醫院內存放著堆積如山病人就診的
病歷,延伸出儲存空間的問題。隨著資訊科技的進步,雲端計算的逐漸興起,它提供了
雲端儲存的服務,使得醫院可以將龐大的病歷電子化並儲存在雲端平台中,改善實體儲
存空間的問題,不過相對地也衍生出電子病歷隱私性的問題,因此本文提出一個電子病
歷加密流程的機制,達到在不洩漏病人隱私的情況下進行病歷的存取與分享。本機制採
用了對稱式金鑰加密並結合新型態屬性加密方法進行隱私性的保護,將加密的流程交由
被信任的第三方處理,以減少使用者保管金鑰的風險。另外,本文也針對醫療體系中不
可或缺的緊急救護加以闡述,提出了一個可以將電子病歷快速分享給醫護人員的機制,
以防止診斷錯造成醫療的糾紛。此架構具有高度可擴展性,無論增加了多少的使用者,
都不會使得機制的效能降低。此外本機制對於儲存在雲端上的電子病歷可以達到完全保
護隱私性,以及有效率的金鑰管理,因此非法使用者無法輕易獲取電子病歷內容。
Electronic medical record for the hospitals in densely populated cities is a new type of structure. In the past, the paper medical records would be increased when each patient visited doctors every time, and this would be caused storage space problems that the hospital stored a great quantity of the records. With the advancement of information technology and the gradual rise of cloud computing, it provides cloud storage service. Therefore, the hospitals can store their huge electronic medical records in the cloud platform in order to improve the problem of physical storage space. But it also brings a privacy issue for electronic medical records. Hence, the thesis proposes an encryption process mechanism of electronic medical records that it can access and share the medical records without leaking the privacy of patients.
The proposed scheme adopts a combination of symmetric key encryption method and a new type of attribute-based encryption method to protect the privacy of patients. The encryption process is handled by a trusted third party to reduce the risk that the users have to keep the keys. In addition, the thesis also elaborates the emergency medical service in the health care system and thus proposes a mechanism that can quickly share electronic medical records to
health care workers in order to prevent medical disputes caused by wrong diagnoses. The structure of the proposed scheme has high scalability which means no matter the number of users increasing, the performance of the scheme won’t be reduced. Moreover, the proposed scheme can assure complete privacy protection for electronic medical records storing in the cloud and achieve efficient key management. Consequently, the illegal users cannot obtain the electronic medical records easily.
目錄
致謝 i
摘 要 ii
ABSTRACTiii
圖目錄 vi
表目錄 vii
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的 3
1.3安全和隱私要求 4
1.4論文章節敘述 6
第二章 相關研究 7
2.1 數學背景知識 7
2.1.1 雙線性映射 7
2.1.2 Lagrange插值法 7
2.1.3 存取結構 8
2.2 密碼學技術 8
2.2.1 對稱式加密演算法 8
2.2.2 非對稱式加密演算法 9
2.2.3 單向雜湊函數 10
2.2.4 數位簽章 10
2.3 屬性加密 11
2.3.1 金鑰策略屬性加密 12
2.3.3 密文策略屬性加密 14
2.4 電子病歷相關研究 16
第三章 所提方法 18
3.1 角色介紹 18
3.2 系統架構 19
3.3 電子病歷存取規則 20
3.4 符號定義 22
3.5 方法流程 23
第四章 安全與比較分析 33
4.1 安全性分析 33
4.2 比較分析 36
第五章 結論 38
5.1 總結 38
5.2 未來展望 38
參考文獻 39
參考文獻
[1] Perera, G., Holbrook, A., Thabane, L., Foster, G., & Willison, D. J. (2011). Views on
Health Information Sharing and Privacy from Primary Care Practices using Electronic
Medical Records. International journal of medical informatics,80(2), (pp.94-101).
[2] Lohr, H., Sadeghi, A. R., & Winandy, M. (2010, November). Securing the e-health Cloud.
In Proceedings of the 1st ACM International Health Informatics Symposium (pp.
220-229).
[3] Li, M., Yu, S., Cao, N., & Lou, W. (2011, June). Authorized Private Keyword Search
Over Encrypted Data in Cloud Computing. In Distributed Computing Systems (ICDCS),
2011 31st International Conference on (pp. 383-392).
[4] Menachemi N, Collum TH (2011) Benefits and Drawbacks of Electronic Health Record
Systems. Risk Management and Healthcare (4), (pp.47–55).
[5] Huang, L. C., Chu, H. C., Lien, C. Y., Hsiao, C. H., & Kao, T. (2009). Privacy
Preservation and Information Security Protection for Patients’ Portable Electronic Health
Records. Computers in Biology and Medicine, 39(9), (pp.743-750).
[6] Li, M., Yu, S., Cao, N., & Lou, W. (2011, June). Authorized Private Keyword Search
over Encrypted Data in Cloud Computing. In Distributed Computing Systems
(ICDCS), 2011 31st International Conference on (pp. 383-392).
[7] Chen, T. S., Liu, C. H., Chen, T. L., Chen, C. S., Bau, J. G., & Lin, T. C. (2012). Secure
Dynamic Access Control Scheme of PHR in Cloud Computing. Journal of Medical
Systems, 36(6), (pp.4005-4020).
[8] Chen, L., & Hoang, D. B. (2011, September). Novel Data Protection Model in
Healthcare Cloud. In High Performance Computing and Communications (HPCC), 40
2011 IEEE 13th International Conference on (pp. 550-555).
[9] U.S. Department of Health & Human Services, (2013). Health Information Privacy , 〈 http://www.hhs.gov/ocr/privacy/ 〉 .
[10] Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing.
[11] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... &
Zaharia, M. (2010). A View of Cloud Computing. Communications of the
ACM,53(4), (pp.50-58).
[12] Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud
Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering
Computing as the 5th Utility. Future Generation Computer Systems, 25(6),(pp. 599-616).
[13] Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and Privacy Challenges in Cloud
Computing Environments. IEEE Security & Privacy, 8(6), (pp.24-31).
[14] Boneh, D., & Franklin, M. (2001, January). Identity-based Encryption from the Weil
Pairing. In Advances in Cryptology—CRYPTO 2001 (pp. 213-229).
[15] Sahai, A., & Waters, B. (2005). Fuzzy Identity-based Encryption. In Advances in
Cryptology–EUROCRYPT 2005 (pp. 457-473).
[16] Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006, October). Attribute-based
Encryption for Fine-grained Access Control of Encrypted Data. In Proceedings of the
13th ACM conference on Computer and Communications Security (pp. 89-98).
[17] Ostrovsky, R., Sahai, A., & Waters, B. (2007,October). Attribute-based Encryption with
Non-monotonic Access Structures. In Proceedings of the 14th ACM Conference on
Computer and Communications Security (pp. 195-203).
[18] Bethencourt, J., Sahai, A., & Waters, B. (2007, May). Ciphertext-policy Attribute-based
Encryption. In Security and Privacy, 2007. SP'07. IEEE Symposium on (pp. 321-334).41
[19] Waters, B. (2011). Ciphertext-policy Attribute-based Encryption: An Expressive,Efficient,
and Provably Secure Realization. In Public Key Cryptography–PKC 2011(pp. 53-70).
[20] Fabian, B., Ermakova, T., & Junghanns, P. (2014). Collaborative and Secure Sharing of
Healthcare Data in Multi-clouds. Information Systems.
[21] Radhini, M. P., Prabha, P. A., & Parthasarathi, P.(2014). Distributed Attribute based
Encryption for Secure Sharing of Personal Medical Records in Cloud. International
Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 5,
(pp.1408-1414)
[22] Radhini, M. P., Ananthaprabha, P., & Parthasarathi, P. (2014). Secure Sharing of Medical
Records Using Cryptographic Methods in Cloud. International Journal of Computer
Science and Mobile Computing, Vol.3 Issue.4, (pp. 514-521)
[23] Xhafa, F., Li, J., Zhao, G., Li, J., Chen, X., & Wong, D. S. (2014). Designing
Cloud-based Electronic Health Record System with Attribute-based Encryption.
Multimedia Tools and Applications, (pp.1-18).
[24] An Overview of Cryptography (http://www.garykessler.netlibrarycrypto.html)
[25] Lee, W. B., & Lee, C. D. (2008). A Cryptographic Key Management Solution for HIPAA
Privacy/Security Regulations. Information Technology in Biomedicine, IEEE
Transactions on, 12(1), (pp.34-41).
[26] Hu, J., Chen, H. H., & Hou, T. W. (2010). A Hybrid Public Key Infrastructure Solution
(HPKI) for HIPAA Privacy/Security Regulations. Computer Standards &
Interfaces, 32(5),(pp. 274-280).
[27] Ibraimi, L., Asim, M., & Petkovic, M. (2009, June). Secure Management of Personal
Health Records by Applying Attribute-based Encryption. In Wearable Micro and Nano
Technologies for Personalized Health (pHealth), 2009 6th International Workshop on (pp. 71-74).
[28] Wang, C., Liu, X., & Li, W. (2012, September). Implementing a Personal Health Record
Cloud Platform Using Ciphertext-policy Attribute-based Encryption. In Intelligent
Networking and Collaborative Systems (INCoS), 2012 4th International
Conferenceon (pp. 8-14).
[29] Patil, P. K., & Pawar, P. M. (2013). PHR Model using Cloud Computing and Attribute
based Encryption. International Journal of Computer Applications, 65(18). (pp.21-24)
[30] Barua, M., Liang, X., Lu, R., & Shen, X. (2011, April). Peace: An Efficient and Secure
Patient-centric Access Control Scheme for Ehealth Care System. In Computer
Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on (pp.
970-975).
[31] Narayan, S., Gagne, M., & Safavi-Naini, R. (2010, October). Privacy Preserving EHR
System using Attribute-based Infrastructure. In Proceedings of the 2010 ACM workshop
on Cloud computing security workshop (pp. 47-52).
[32] Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and Secure Sharing of
Personal Health Records in Cloud Computing Using Attribute-based
Encryption. Parallel and Distributed Systems, IEEE Transactions on, 24(1),
(pp.131-143).
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔